-
Spatio-Temporal Information Freshness for Remote Source Monitoring in IoT Systems
Authors:
Andrea Munari,
Federico Chiariotti,
Leonardo Badia,
Petar Popovski
Abstract:
The widespread adoption of age of information (AoI) as a meaningful and analytically tractable information freshness metric has led to a wide body of work on the timing performance of Internet of things (IoT) systems. However, the spatial correlation inherent to environmental monitoring has been mostly neglected in the recent literature, due to the significant modeling complexity it introduces. In…
▽ More
The widespread adoption of age of information (AoI) as a meaningful and analytically tractable information freshness metric has led to a wide body of work on the timing performance of Internet of things (IoT) systems. However, the spatial correlation inherent to environmental monitoring has been mostly neglected in the recent literature, due to the significant modeling complexity it introduces. In this work, we address this gap by presenting a model of spatio-temporal information freshness, considering the conditional entropy of the system state in a remote monitoring scenario, such as a low-orbit satellite collecting information from a wide geographical area. Our analytical results show that purely age-oriented schemes tend to select an overly broad communication range, leading to inaccurate estimates and energy inefficiency, both of which can be mitigated by adopting a spatio-temporal approach.
△ Less
Submitted 5 June, 2025;
originally announced June 2025.
-
Medium Access for Push-Pull Data Transmission in 6G Wireless Systems
Authors:
Shashi Raj Pandey,
Fabio Saggese,
Junya Shiraishi,
Federico Chiariotti,
Petar Popovski
Abstract:
Medium access in 5G systems was tailored to accommodate diverse traffic classes through network resource slicing. 6G wireless systems are expected to be significantly reliant on Artificial Intelligence (AI), leading to data-driven and goal-oriented communication. This leads to augmentation of the design space for Medium Access Control (MAC) protocols, which is the focus of this article. We introdu…
▽ More
Medium access in 5G systems was tailored to accommodate diverse traffic classes through network resource slicing. 6G wireless systems are expected to be significantly reliant on Artificial Intelligence (AI), leading to data-driven and goal-oriented communication. This leads to augmentation of the design space for Medium Access Control (MAC) protocols, which is the focus of this article. We introduce a taxonomy based on push-based and pull-based communication, which is useful to categorize both the legacy and the AI-driven access schemes. We provide MAC protocol design guidelines for pull- and push-based communication in terms of goal-oriented criteria, such as timing and data relevance. We articulate a framework for co-existence between pull and push-based communications in 6G systems, combining their advantages. We highlight the design principles and main tradeoffs, as well as the architectural considerations for integrating these designs in Open-Radio Access Network (O-RAN) and 6G systems.
△ Less
Submitted 3 April, 2025;
originally announced April 2025.
-
Movement- and Traffic-based User Identification in Commercial Virtual Reality Applications: Threats and Opportunities
Authors:
Sara Baldoni,
Salim Benhamadi,
Federico Chiariotti,
Michele Zorzi,
Federica Battisti
Abstract:
With the unprecedented diffusion of virtual reality, the number of application scenarios is continuously growing. As commercial and gaming applications become pervasive, the need for the secure and convenient identification of users, often overlooked by the research in immersive media, is becoming more and more pressing. Networked scenarios such as Cloud gaming or cooperative virtual training and…
▽ More
With the unprecedented diffusion of virtual reality, the number of application scenarios is continuously growing. As commercial and gaming applications become pervasive, the need for the secure and convenient identification of users, often overlooked by the research in immersive media, is becoming more and more pressing. Networked scenarios such as Cloud gaming or cooperative virtual training and teleoperation require both a user-friendly and streamlined experience and user privacy and security. In this work, we investigate the possibility of identifying users from their movement patterns and data traffic traces while playing four commercial games, using a publicly available dataset. If, on the one hand, this paves the way for easy identification and automatic customization of the virtual reality content, it also represents a serious threat to users' privacy due to network analysis-based fingerprinting. Based on this, we analyze the threats and opportunities for virtual reality users' security and privacy.
△ Less
Submitted 27 January, 2025;
originally announced January 2025.
-
Goal-Oriented Medium Access with Distributed Belief Processing
Authors:
Federico Chiariotti,
Andrea Munari,
Leonardo Badia,
Petar Popovski
Abstract:
Goal-oriented communication entails the timely transmission of updates related to a specific goal defined by the application. In a distributed setup with multiple sensors, each individual sensor knows its own observation and can determine its freshness, as measured by Age of Incorrect Information (AoII). This local knowledge is suited for distributed medium access, where the transmission strategie…
▽ More
Goal-oriented communication entails the timely transmission of updates related to a specific goal defined by the application. In a distributed setup with multiple sensors, each individual sensor knows its own observation and can determine its freshness, as measured by Age of Incorrect Information (AoII). This local knowledge is suited for distributed medium access, where the transmission strategies have to deal with collisions. We present Dynamic Epistemic Logic for Tracking Anomalies (DELTA), a medium access protocol that limits collisions and minimizes AoII in anomaly reporting over dense networks. Each sensor knows its own AoII, while it can compute the belief about the AoII for all other sensors, based on their Age of Information (AoI), which is inferred from the acknowledgments. This results in a goal-oriented approach based on dynamic epistemic logic emerging from public information. We analyze the resulting DELTA protocol both from a theoretical standpoint and with Monte Carlo simulations, showing that it is significantly more efficient and robust than classical random access, while outperforming state-of-the-art scheduled schemes by at least 30%, even with imperfect feedback.
△ Less
Submitted 19 March, 2025; v1 submitted 10 December, 2024;
originally announced December 2024.
-
Peak Age of Incorrect Information of Reactive ALOHA Reporting Under Imperfect Feedback
Authors:
Federico Chiariotti,
Andrea Munari,
Leonardo Badia,
Petar Popovski
Abstract:
Age of Incorrect Information (AoII) is particularly relevant in systems where real time responses to anomalies are required, such as natural disaster alerts, cybersecurity warnings, or medical emergency notifications. Keeping system control with wrong information for too long can lead to inappropriate responses. In this paper, we study the Peak AoII (PAoII) for multi-source status reporting by ind…
▽ More
Age of Incorrect Information (AoII) is particularly relevant in systems where real time responses to anomalies are required, such as natural disaster alerts, cybersecurity warnings, or medical emergency notifications. Keeping system control with wrong information for too long can lead to inappropriate responses. In this paper, we study the Peak AoII (PAoII) for multi-source status reporting by independent devices over a collision channel, following a zero-threshold ALOHA access where nodes observing an anomaly immediately start transmitting about it. If a collision occurs, nodes reduce the transmission probability to allow for a resolution. Finally, wrong or lost feedback messages may lead a node that successfully updated the destination to believe a collision happened. The PAoII for this scenario is computed in closed-form. We are eventually able to derive interesting results concerning the minimization of PAoII, which can be traded against the overall goodput and energy efficiency, but may push the system to the edge of congestion collapse.
△ Less
Submitted 13 November, 2024;
originally announced November 2024.
-
Eavesdropping on Goal-Oriented Communication: Timing Attacks and Countermeasures
Authors:
Federico Mason,
Federico Chiariotti,
Pietro Talli,
Andrea Zanella
Abstract:
Goal-oriented communication is a new paradigm that considers the meaning of transmitted information to optimize communication. One possible application is the remote monitoring of a process under communication costs: scheduling updates based on goal-oriented considerations can significantly reduce transmission frequency while maintaining high-quality tracking performance. However, goal-oriented sc…
▽ More
Goal-oriented communication is a new paradigm that considers the meaning of transmitted information to optimize communication. One possible application is the remote monitoring of a process under communication costs: scheduling updates based on goal-oriented considerations can significantly reduce transmission frequency while maintaining high-quality tracking performance. However, goal-oriented scheduling also opens a timing-based side-channel that an eavesdropper may exploit to obtain information about the state of the remote process, even if the content of updates is perfectly secure. In this work, we study an eavesdropping attack against pull-based goal-oriented scheduling for the tracking of remote Markov processes. We provide a theoretical framework for defining the effectiveness of the attack and of possible countermeasures, as well as a practical heuristic that can provide a balance between the performance gains offered by goal-oriented communication and the information leakage.
△ Less
Submitted 6 March, 2025; v1 submitted 11 November, 2024;
originally announced November 2024.
-
To Train or Not to Train: Balancing Efficiency and Training Cost in Deep Reinforcement Learning for Mobile Edge Computing
Authors:
Maddalena Boscaro,
Federico Mason,
Federico Chiariotti,
Andrea Zanella
Abstract:
Artificial Intelligence (AI) is a key component of 6G networks, as it enables communication and computing services to adapt to end users' requirements and demand patterns. The management of Mobile Edge Computing (MEC) is a meaningful example of AI application: computational resources available at the network edge need to be carefully allocated to users, whose jobs may have different priorities and…
▽ More
Artificial Intelligence (AI) is a key component of 6G networks, as it enables communication and computing services to adapt to end users' requirements and demand patterns. The management of Mobile Edge Computing (MEC) is a meaningful example of AI application: computational resources available at the network edge need to be carefully allocated to users, whose jobs may have different priorities and latency requirements. The research community has developed several AI algorithms to perform this resource allocation, but it has neglected a key aspect: learning is itself a computationally demanding task, and considering free training results in idealized conditions and performance in simulations. In this work, we consider a more realistic case in which the cost of learning is specifically accounted for, presenting a new algorithm to dynamically select when to train a Deep Reinforcement Learning (DRL) agent that allocates resources. Our method is highly general, as it can be directly applied to any scenario involving a training overhead, and it can approach the same performance as an ideal learning agent even under realistic training conditions.
△ Less
Submitted 11 November, 2024;
originally announced November 2024.
-
Content-based Wake-up for Energy-efficient and Timely Top-k IoT Sensing Data Retrieval
Authors:
Junya Shiraishi,
Anders E. Kalør,
Israel Leyva-Mayorga,
Federico Chiariotti,
Petar Popovski,
Hiroyuki Yomo
Abstract:
Energy efficiency and information freshness are key requirements for sensor nodes serving Industrial Internet of Things (IIoT) applications, where a sink node collects informative and fresh data before a deadline, e.g., to control an external actuator. Content-based wake-up (CoWu) activates a subset of nodes that hold data relevant for the sink's goal, thereby offering an energy-efficient way to a…
▽ More
Energy efficiency and information freshness are key requirements for sensor nodes serving Industrial Internet of Things (IIoT) applications, where a sink node collects informative and fresh data before a deadline, e.g., to control an external actuator. Content-based wake-up (CoWu) activates a subset of nodes that hold data relevant for the sink's goal, thereby offering an energy-efficient way to attain objectives related to information freshness. This paper focuses on a scenario where the sink collects fresh information on top-k values, defined as data from the nodes observing the k highest readings at the deadline. We introduce a new metric called top-k Query Age of Information (k-QAoI), which allows us to characterize the performance of CoWu by considering the characteristics of the physical process. Further, we show how to select the CoWu parameters, such as its timing and threshold, to attain both information freshness and energy efficiency. The numerical results reveal the effectiveness of the CoWu approach, which is able to collect top-k data with higher energy efficiency while reducing k-QAoI when compared to round-robin scheduling, especially when the number of nodes is large and the required size of k is small.
△ Less
Submitted 14 March, 2025; v1 submitted 8 October, 2024;
originally announced October 2024.
-
Pragmatic Communication for Remote Control of Finite-State Markov Processes
Authors:
Pietro Talli,
Edoardo David Santi,
Federico Chiariotti,
Touraj Soleymani,
Federico Mason,
Andrea Zanella,
Deniz Gündüz
Abstract:
Pragmatic or goal-oriented communication can optimize communication decisions beyond the reliable transmission of data, instead aiming at directly affecting application performance with the minimum channel utilization. In this paper, we develop a general theoretical framework for the remote control of finite-state Markov processes, using pragmatic communication over a costly zero-delay communicati…
▽ More
Pragmatic or goal-oriented communication can optimize communication decisions beyond the reliable transmission of data, instead aiming at directly affecting application performance with the minimum channel utilization. In this paper, we develop a general theoretical framework for the remote control of finite-state Markov processes, using pragmatic communication over a costly zero-delay communication channel. To that end, we model a cyber-physical system composed of an encoder, which observes and transmits the states of a process in real-time, and a decoder, which receives that information and controls the behavior of the process. The encoder and the decoder should cooperatively optimize the trade-off between the control performance (i.e., reward) and the communication cost (i.e., channel use). This scenario underscores a pragmatic (i.e., goal-oriented) communication problem, where the purpose is to convey only the data that is most valuable for the underlying task, taking into account the state of the decoder (hence, the pragmatic aspect). We investigate two different decision-making architectures: in pull-based remote control, the decoder is the only decision-maker, while in push-based remote control, the encoder and the decoder constitute two independent decision-makers, leading to a multi-agent scenario. We propose three algorithms to optimize our system (i.e., design the encoder and the decoder policies), discuss the optimality guarantees ofs the algorithms, and shed light on their computational complexity and fundamental limits.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
End-to-End Delivery in LEO Mega-constellations and the Reordering Problem
Authors:
Rasmus Sibbern Frederiksen,
Thomas Gundgaard Mulvad,
Israel Leyva-Mayorga,
Tatiana Kozlova Madsen,
Federico Chiariotti
Abstract:
Low Earth orbit (LEO) satellite mega-constellations with hundreds or thousands of satellites and inter-satellite links (ISLs) have the potential to provide global end-to-end connectivity. Furthermore, if the physical distance between source and destination is sufficiently long, end-to-end routing over the LEO constellation can provide lower latency when compared to the terrestrial infrastructure d…
▽ More
Low Earth orbit (LEO) satellite mega-constellations with hundreds or thousands of satellites and inter-satellite links (ISLs) have the potential to provide global end-to-end connectivity. Furthermore, if the physical distance between source and destination is sufficiently long, end-to-end routing over the LEO constellation can provide lower latency when compared to the terrestrial infrastructure due to the faster propagation of electromagnetic waves in space than in optic fiber. However, the frequent route changes due to the movement of the satellites result in the out-of-order delivery of packets, causing sudden changes to the Round-Trip Time (RTT) that can be misinterpreted as congestion by congestion control algorithms. In this paper, the performance of three widely used congestion control algorithms, Cubic, Reno, and BBR, is evaluated in an emulated LEO satellite constellation with Free-Space Optical (FSO) ISLs. Furthermore, we perform a sensitivity analysis for Cubic by changing the satellite constellation parameters, length of the routes, and the positions of the source and destination to identify problematic routing scenarios. The results show that route changes can have profound transient effects on the goodput of the connection, posing problems for typical broadband applications.
△ Less
Submitted 13 May, 2024;
originally announced May 2024.
-
A Fairness-Oriented Reinforcement Learning Approach for the Operation and Control of Shared Micromobility Services
Authors:
Matteo Cederle,
Luca Vittorio Piron,
Marina Ceccon,
Federico Chiariotti,
Alessandro Fabris,
Marco Fabris,
Gian Antonio Susto
Abstract:
As Machine Learning grows in popularity across various fields, equity has become a key focus for the AI community. However, fairness-oriented approaches are still underexplored in smart mobility. Addressing this gap, our study investigates the balance between performance optimization and algorithmic fairness in shared micromobility services providing a novel framework based on Reinforcement Learni…
▽ More
As Machine Learning grows in popularity across various fields, equity has become a key focus for the AI community. However, fairness-oriented approaches are still underexplored in smart mobility. Addressing this gap, our study investigates the balance between performance optimization and algorithmic fairness in shared micromobility services providing a novel framework based on Reinforcement Learning. Exploiting Q-learning, the proposed methodology achieves equitable outcomes in terms of the Gini index across different areas characterized by their distance from central hubs. Through vehicle rebalancing, the provided scheme maximizes operator performance while ensuring fairness principles for users, reducing iniquity by up to 85% while only increasing costs by 30% (w.r.t. applying no equity adjustment). A case study with synthetic data validates our insights and highlights the importance of fairness in urban micromobility (source code: https://github.com/mcederle99/FairMSS.git).
△ Less
Submitted 17 January, 2025; v1 submitted 23 March, 2024;
originally announced March 2024.
-
Effective Communication with Dynamic Feature Compression
Authors:
Pietro Talli,
Francesco Pase,
Federico Chiariotti,
Andrea Zanella,
Michele Zorzi
Abstract:
The remote wireless control of industrial systems is one of the major use cases for 5G and beyond systems: in these cases, the massive amounts of sensory information that need to be shared over the wireless medium may overload even high-capacity connections. Consequently, solving the effective communication problem by optimizing the transmission strategy to discard irrelevant information can provi…
▽ More
The remote wireless control of industrial systems is one of the major use cases for 5G and beyond systems: in these cases, the massive amounts of sensory information that need to be shared over the wireless medium may overload even high-capacity connections. Consequently, solving the effective communication problem by optimizing the transmission strategy to discard irrelevant information can provide a significant advantage, but is often a very complex task. In this work, we consider a prototypal system in which an observer must communicate its sensory data to a robot controlling a task (e.g., a mobile robot in a factory). We then model it as a remote Partially Observable Markov Decision Process (POMDP), considering the effect of adopting semantic and effective communication-oriented solutions on the overall system performance. We split the communication problem by considering an ensemble Vector Quantized Variational Autoencoder (VQ-VAE) encoding, and train a Deep Reinforcement Learning (DRL) agent to dynamically adapt the quantization level, considering both the current state of the environment and the memory of past messages. We tested the proposed approach on the well-known CartPole reference control problem, obtaining a significant performance increase over traditional approaches.
△ Less
Submitted 29 January, 2024;
originally announced January 2024.
-
Push- and Pull-based Effective Communication in Cyber-Physical Systems
Authors:
Pietro Talli,
Federico Mason,
Federico Chiariotti,
Andrea Zanella
Abstract:
In Cyber Physical Systems (CPSs), two groups of actors interact toward the maximization of system performance: the sensors, observing and disseminating the system state, and the actuators, performing physical decisions based on the received information. While it is generally assumed that sensors periodically transmit updates, returning the feedback signal only when necessary, and consequently adap…
▽ More
In Cyber Physical Systems (CPSs), two groups of actors interact toward the maximization of system performance: the sensors, observing and disseminating the system state, and the actuators, performing physical decisions based on the received information. While it is generally assumed that sensors periodically transmit updates, returning the feedback signal only when necessary, and consequently adapting the physical decisions to the communication policy, can significantly improve the efficiency of the system. In particular, the choice between push-based communication, in which updates are initiated autonomously by the sensors, and pull-based communication, in which they are requested by the actuators, is a key design step. In this work, we propose an analytical model for optimizing push- and pull-based communication in CPSs, observing that the policy optimality coincides with Value of Information (VoI) maximization. Our results also highlight that, despite providing a better optimal solution, implementable push-based communication strategies may underperform even in relatively simple scenarios.
△ Less
Submitted 15 January, 2024;
originally announced January 2024.
-
Energy-Efficient Internet of Things Monitoring with Content-Based Wake-Up Radio
Authors:
Anay Ajit Deshpande,
Federico Chiariotti,
Andrea Zanella
Abstract:
The use of Wake-Up Radio (WUR) in Internet of Things (IoT) networks can significantly improve their energy efficiency: battery-powered sensors can remain in a low-power (sleep) mode while listening for wake-up messages using their WUR and reactivate only when polled. However, polling-based WUR may still lead to wasted energy if values sensed by the polled sensors provide no new information to the…
▽ More
The use of Wake-Up Radio (WUR) in Internet of Things (IoT) networks can significantly improve their energy efficiency: battery-powered sensors can remain in a low-power (sleep) mode while listening for wake-up messages using their WUR and reactivate only when polled. However, polling-based WUR may still lead to wasted energy if values sensed by the polled sensors provide no new information to the receiver, or in general have a low Value of Information (VoI). In this paper, we design a content-based WUR that tracks the process observed by the sensors and only wakes up the sensor if its estimated update's VoI is higher than a threshold communicated through the poll. If the sensor does not reply to the polling request, the Gateway (GW) can make a Bayesian update, knowing that either the sensor value substantially confirms its current estimate or the transmission failed due to the wireless channel. We analyze the trade-off between the tracking error and the battery lifetime of the sensors, showing that content-based WUR can provide fine-grained control of this trade-off and significantly increase the battery lifetime of the node with a minimal Mean Squared Error (MSE) increase.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
Low-Latency Massive Access with Multicast Wake Up Radio
Authors:
Anay Ajit Deshpande,
Federico Chiariotti,
Andrea Zanella
Abstract:
The use of Wake-Up Radio (WUR) in Internet of Things (IoT) networks can significantly improve their energy efficiency: battery-powered sensors can remain in a low-power (sleep) mode while listening for wake-up messages using their WUR and reactivate only when polled, saving energy. However, polling-based Time Division Multiple Access (TDMA) may significantly increase data transmission delay if pac…
▽ More
The use of Wake-Up Radio (WUR) in Internet of Things (IoT) networks can significantly improve their energy efficiency: battery-powered sensors can remain in a low-power (sleep) mode while listening for wake-up messages using their WUR and reactivate only when polled, saving energy. However, polling-based Time Division Multiple Access (TDMA) may significantly increase data transmission delay if packets are generated sporadically, as nodes with no information still need to be polled. In this paper, we examine the effect of multicast polling for WUR-enabled wireless nodes. The idea is to assign nodes to multicast groups so that all nodes in the same group can be solicited by a multicast polling message. This may cause collisions, which can be solved by requesting retransmissions from the involved nodes. We analyze the performance of different multicast polling and retransmission strategies, showing that the optimal approach can significantly reduce the delay over TDMA and ALOHA in low-traffic scenarios while keeping good energy efficiency.
△ Less
Submitted 27 July, 2023;
originally announced July 2023.
-
Age of Information Analysis in Shared Edge Computing Servers
Authors:
Federico Chiariotti
Abstract:
Mobile Edge Computing (MEC) is expected to play a significant role in the development of 6G networks, as new applications such as cooperative driving and eXtended Reality (XR) require both communication and computational resources from the network edge. However, the limited capabilities of edge servers may be strained to perform complex computational tasks within strict latency bounds for multiple…
▽ More
Mobile Edge Computing (MEC) is expected to play a significant role in the development of 6G networks, as new applications such as cooperative driving and eXtended Reality (XR) require both communication and computational resources from the network edge. However, the limited capabilities of edge servers may be strained to perform complex computational tasks within strict latency bounds for multiple clients. In these contexts, both maintaining a low average Age of Information (AoI) and guaranteeing a low Peak AoI (PAoI) even in the worst case may have significant user experience and safety implications. In this work, we investigate a theoretical model of a MEC server, deriving the expected AoI and the PAoI and latency distributions under the First In First Out (FIFO) and Generalized Processor Sharing (GPS) resource allocation policies. We consider both synchronized and unsynchronized systems, and draw insights on the robust design of resource allocation policies from the analytical results.
△ Less
Submitted 5 July, 2023;
originally announced July 2023.
-
Timely and Massive Communication in 6G: Pragmatics, Learning, and Inference
Authors:
Deniz Gündüz,
Federico Chiariotti,
Kaibin Huang,
Anders E. Kalør,
Szymon Kobus,
Petar Popovski
Abstract:
5G has expanded the traditional focus of wireless systems to embrace two new connectivity types: ultra-reliable low latency and massive communication. The technology context at the dawn of 6G is different from the past one for 5G, primarily due to the growing intelligence at the communicating nodes. This has driven the set of relevant communication problems beyond reliable transmission towards sem…
▽ More
5G has expanded the traditional focus of wireless systems to embrace two new connectivity types: ultra-reliable low latency and massive communication. The technology context at the dawn of 6G is different from the past one for 5G, primarily due to the growing intelligence at the communicating nodes. This has driven the set of relevant communication problems beyond reliable transmission towards semantic and pragmatic communication. This paper puts the evolution of low-latency and massive communication towards 6G in the perspective of these new developments. At first, semantic/pragmatic communication problems are presented by drawing parallels to linguistics. We elaborate upon the relation of semantic communication to the information-theoretic problems of source/channel coding, while generalized real-time communication is put in the context of cyber-physical systems and real-time inference. The evolution of massive access towards massive closed-loop communication is elaborated upon, enabling interactive communication, learning, and cooperation among wireless sensors and actuators.
△ Less
Submitted 26 September, 2023; v1 submitted 30 June, 2023;
originally announced June 2023.
-
Fast Context Adaptation in Cost-Aware Continual Learning
Authors:
Seyyidahmed Lahmer,
Federico Mason,
Federico Chiariotti,
Andrea Zanella
Abstract:
In the past few years, DRL has become a valuable solution to automatically learn efficient resource management strategies in complex networks with time-varying statistics. However, the increased complexity of 5G and Beyond networks requires correspondingly more complex learning agents and the learning process itself might end up competing with users for communication and computational resources. T…
▽ More
In the past few years, DRL has become a valuable solution to automatically learn efficient resource management strategies in complex networks with time-varying statistics. However, the increased complexity of 5G and Beyond networks requires correspondingly more complex learning agents and the learning process itself might end up competing with users for communication and computational resources. This creates friction: on the one hand, the learning process needs resources to quickly convergence to an effective strategy; on the other hand, the learning process needs to be efficient, i.e., take as few resources as possible from the user's data plane, so as not to throttle users' QoS. In this paper, we investigate this trade-off and propose a dynamic strategy to balance the resources assigned to the data plane and those reserved for learning. With the proposed approach, a learning agent can quickly converge to an efficient resource allocation strategy and adapt to changes in the environment as for the CL paradigm, while minimizing the impact on the users' QoS. Simulation results show that the proposed method outperforms static allocation methods with minimal learning overhead, almost reaching the performance of an ideal out-of-band CL solution.
△ Less
Submitted 6 June, 2023;
originally announced June 2023.
-
Goal-Oriented Scheduling in Sensor Networks with Application Timing Awareness
Authors:
Josefine Holm,
Federico Chiariotti,
Anders E. Kalør,
Beatriz Soret,
Torben Bach Pedersen,
Petar Popovski
Abstract:
Taking inspiration from linguistics, the communications theoretical community has recently shown a significant recent interest in pragmatic , or goal-oriented, communication. In this paper, we tackle the problem of pragmatic communication with multiple clients with different, and potentially conflicting, objectives. We capture the goal-oriented aspect through the metric of Value of Information (Vo…
▽ More
Taking inspiration from linguistics, the communications theoretical community has recently shown a significant recent interest in pragmatic , or goal-oriented, communication. In this paper, we tackle the problem of pragmatic communication with multiple clients with different, and potentially conflicting, objectives. We capture the goal-oriented aspect through the metric of Value of Information (VoI), which considers the estimation of the remote process as well as the timing constraints. However, the most common definition of VoI is simply the Mean Square Error (MSE) of the whole system state, regardless of the relevance for a specific client. Our work aims to overcome this limitation by including different summary statistics, i.e., value functions of the state, for separate clients, and a diversified query process on the client side, expressed through the fact that different applications may request different functions of the process state at different times. A query-aware Deep Reinforcement Learning (DRL) solution based on statically defined VoI can outperform naive approaches by 15-20%.
△ Less
Submitted 6 June, 2023;
originally announced June 2023.
-
Learning-Based Rich Feedback HARQ for Energy-Efficient Uplink Short Packet Transmission
Authors:
Martin Voigt Vejling,
Federico Chiariotti,
Anders Ellersgaard Kalør,
Deniz Gündüz,
Gianluigi Liva,
Petar Popovski
Abstract:
The trade-off between reliability, latency, and energy efficiency is a central problem in communication systems. Advanced hybrid automated repeat request (HARQ) techniques reduce retransmissions required for reliable communication but incur high computational costs. Strict energy constraints apply mainly to devices, while the access point receiving their packets is usually connected to the electri…
▽ More
The trade-off between reliability, latency, and energy efficiency is a central problem in communication systems. Advanced hybrid automated repeat request (HARQ) techniques reduce retransmissions required for reliable communication but incur high computational costs. Strict energy constraints apply mainly to devices, while the access point receiving their packets is usually connected to the electrical grid. Therefore, moving the computational complexity from the transmitter to the receiver may provide a way to improve this trade-off. We propose the reinforcement-based adaptive feedback (RAF) scheme, a departure from traditional single-bit feedback HARQ, introducing adaptive rich feedback where the receiver requests the coded retransmission of specific symbols. Simulation results show that RAF achieves a better trade-off between energy efficiency, reliability, and latency, compared to existing HARQ solutions. Our RAF scheme can easily adapt to different modulation schemes and can also generalize to different channel statistics.
△ Less
Submitted 17 February, 2025; v1 submitted 5 June, 2023;
originally announced June 2023.
-
Dynamic Reliability: Reliably Sending Unreliable Data
Authors:
Omar Nassef,
Federico Chiariotti,
Stephen Johnson,
Toktam Mahmoodi
Abstract:
5G and Beyond networks promise low-latency support for applications that need to deliver mission-critical data with strict deadlines. However, innovations on the physical and medium access layers are not sufficient. Additional considerations are needed to support applications under different network topologies, and while network setting and data paths change. Such support could be developed at the…
▽ More
5G and Beyond networks promise low-latency support for applications that need to deliver mission-critical data with strict deadlines. However, innovations on the physical and medium access layers are not sufficient. Additional considerations are needed to support applications under different network topologies, and while network setting and data paths change. Such support could be developed at the transport layer, ensuring end-to-end latency in a dynamic network and connectivity environment. In this paper, we present a partial reliability framework, which governs per-packet reliability through bespoke policies at the transport layer. The framework follows a no-ack and no-retransmit philosophy for unreliable transmission of packets, yet maintains cooperation with its reliable counterpart for arbitrary use of either transmission mode. This can then address latency and reliability fluctuations in a changing network environment, by smartly altering packet reliability. Our evaluations are conducted using mininet to simulate real-world network characteristics, while using a video streaming application as a real-time use-case. The results demonstrate the reduction of session packet volume and backlogged packets, with little to no effect on the freshness of the packet updates.
△ Less
Submitted 22 March, 2023;
originally announced March 2023.
-
Multi-Agent Reinforcement Learning for Pragmatic Communication and Control
Authors:
Federico Mason,
Federico Chiariotti,
Andrea Zanella,
Petar Popovski
Abstract:
The automation of factories and manufacturing processes has been accelerating over the past few years, boosted by the Industry 4.0 paradigm, including diverse scenarios with mobile, flexible agents. Efficient coordination between mobile robots requires reliable wireless transmission in highly dynamic environments, often with strict timing requirements. Goal-oriented communication is a possible sol…
▽ More
The automation of factories and manufacturing processes has been accelerating over the past few years, boosted by the Industry 4.0 paradigm, including diverse scenarios with mobile, flexible agents. Efficient coordination between mobile robots requires reliable wireless transmission in highly dynamic environments, often with strict timing requirements. Goal-oriented communication is a possible solution for this problem: communication decisions should be optimized for the target control task, providing the information that is most relevant to decide which action to take. From the control perspective, networked control design takes the communication impairments into account in its optmization of physical actions. In this work, we propose a joint design that combines goal-oriented communication and networked control into a single optimization model, an extension of a multiagent POMDP which we call Cyber-Physical POMDP (CP-POMDP). The model is flexible enough to represent several swarm and cooperative scenarios, and we illustrate its potential with two simple reference scenarios with a single agent and a set of supporting sensors. Joint training of the communication and control systems can significantly improve the overall performance, particularly if communication is severely constrained, and can even lead to implicit coordination of communication actions.
△ Less
Submitted 28 February, 2023;
originally announced February 2023.
-
On the Role of Preemption for Timing Metrics in Coded Multipath Communication
Authors:
Federico Chiariotti,
Beatriz Soret,
Petar Popovski
Abstract:
Recent trends in communication networks have focused on Quality of Service (QoS) requirements expressed through timing metrics such as latency or Age of Information (AoI). A possible way to achieve this is coded multipath communication: redundancy is added to a block of information through a robust packet-level code, transmitting across multiple independent channels to reduce the impact of blockag…
▽ More
Recent trends in communication networks have focused on Quality of Service (QoS) requirements expressed through timing metrics such as latency or Age of Information (AoI). A possible way to achieve this is coded multipath communication: redundancy is added to a block of information through a robust packet-level code, transmitting across multiple independent channels to reduce the impact of blockages or rate fluctuation. The number of these links can grow significantly over traditional two-path schemes: in these scenarios, the optimization of the timing metrics is non-trivial, and latency and AoI might require different settings. In particular, packet preemption is often the optimal solution to optimize AoI in uncoded communication, but can significantly reduce the reliability of individual blocks. In this work, we model the multipath communication as a fork-join D/M/(K,N)/L queue, where K blocks of information are encoded into N>K redundant blocks. We derive the latency and Peak AoI (PAoI) distributions for different values of the queue size L. Our results show that preemption is not always the optimal choice, as dropping a late packet on one path might affect the reliability of the whole block, and that minimizing the PAoI leads to poor latency performance.
△ Less
Submitted 15 February, 2023;
originally announced February 2023.
-
The Role of Game Networking in the Fusion of Physical and Digital Worlds through 6G Wireless Networks
Authors:
Van-Phuc Bui,
Shashi Raj Pandey,
Andreas Casparsen,
Federico Chiariotti,
Petar Popovski
Abstract:
The sixth generation (6G) of wireless technology is seen as one of the enablers of real-time fusion of the physical and digital realms, as in Digital Twin, eXtended reality, or the Metaverse. This would allow people to interact, work, and entertain themselves in an immersive social network of online 3D virtual environments. From the viewpoint of communication and networking, this will represent an…
▽ More
The sixth generation (6G) of wireless technology is seen as one of the enablers of real-time fusion of the physical and digital realms, as in Digital Twin, eXtended reality, or the Metaverse. This would allow people to interact, work, and entertain themselves in an immersive social network of online 3D virtual environments. From the viewpoint of communication and networking, this will represent an evolution of the game networking technology, designed to interconnect massive users in real-time online gaming environments. This article presents the basic principles of game networking and discusses their evolution towards meeting the requirements of the Metaverse and similar applications. Several open research challenges are discussed, along with possible solutions through experimental case studies.
△ Less
Submitted 3 December, 2024; v1 submitted 3 February, 2023;
originally announced February 2023.
-
A Web of Things Architecture for Digital Twin Creation and Model-Based Reinforcement Control
Authors:
Luca Bedogni,
Federico Chiariotti
Abstract:
Internet of Things (IoT) devices are available in a multitude of scenarios, and provide constant, contextual data which can be leveraged to automatically reconfigure and optimize smart environments. To realize this vision, Artificial Intelligence (AI) and deep learning techniques are usually employed, however they need large quantity of data which is often not feasible in IoT scenarios. Digital Tw…
▽ More
Internet of Things (IoT) devices are available in a multitude of scenarios, and provide constant, contextual data which can be leveraged to automatically reconfigure and optimize smart environments. To realize this vision, Artificial Intelligence (AI) and deep learning techniques are usually employed, however they need large quantity of data which is often not feasible in IoT scenarios. Digital Twins (DTs) have recently emerged as an effective way to replicate physical entities in the digital domain, to allow for simulation and testing of models and services. In this paper, we present a novel architecture based on the emerging Web of Things (WoT) standard, which provides a DT of a smart environment and applies Deep Reinforcement Learning (DRL) techniques on real time data. We implement our system in a real deployment, and test it along with a legacy system. Our findings show that the benefits of having a digital twin, specifically for DRL models, allow for faster convergence and finer tuning.
△ Less
Submitted 30 January, 2023;
originally announced January 2023.
-
A Decentralized Policy for Minimization of Age of Incorrect Information in Slotted ALOHA Systems
Authors:
Anupam Nayak,
Anders E. Kalør,
Federico Chiariotti,
Petar Popovski
Abstract:
The Age of Incorrect Information (AoII) is a metric that can combine the freshness of the information available to a gateway in an Internet of Things (IoT) network with the accuracy of that information. As such, minimizing the AoII can allow the operators of IoT systems to have a more precise and up-to-date picture of the environment in which the sensors are deployed. However, most IoT systems do…
▽ More
The Age of Incorrect Information (AoII) is a metric that can combine the freshness of the information available to a gateway in an Internet of Things (IoT) network with the accuracy of that information. As such, minimizing the AoII can allow the operators of IoT systems to have a more precise and up-to-date picture of the environment in which the sensors are deployed. However, most IoT systems do not allow for centralized scheduling or explicit coordination, as sensors need to be extremely simple and consume as little power as possible. Finding a decentralized policy to minimize the AoII can be extremely challenging in this setting. This paper presents a heuristic to optimize AoII for a slotted ALOHA system, starting from a threshold-based policy and using dual methods to converge to a better solution. This method can significantly outperform state-independent policies, finding an efficient balance between frequent updates and a low number of packet collisions.
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
Scheduling Policy for Value-of-Information (VoI) in Trajectory Estimation for Digital Twins
Authors:
Van-Phuc Bui,
Shashi Raj Pandey,
Federico Chiariotti,
Petar Popovski
Abstract:
This paper presents an approach to schedule observations from different sensors in an environment to ensure their timely delivery and build a digital twin (DT) model of the system dynamics. At the cloud platform, DT models estimate and predict the system's state, then compute the optimal scheduling policy and resource allocation strategy to be executed in the physical world. However, given limited…
▽ More
This paper presents an approach to schedule observations from different sensors in an environment to ensure their timely delivery and build a digital twin (DT) model of the system dynamics. At the cloud platform, DT models estimate and predict the system's state, then compute the optimal scheduling policy and resource allocation strategy to be executed in the physical world. However, given limited network resources, partial state vector information, and measurement errors at the distributed sensing agents, the acquisition of data (i.e., observations) for efficient state estimation of system dynamics is a non-trivial problem. We propose a Value of Information (VoI)-based algorithm that provides a polynomial-time solution for selecting the most informative subset of sensing agents to improve confidence in the state estimation of DT models. Numerical results confirm that the proposed method outperforms other benchmarks, reducing the communication overhead by half while maintaining the required estimation accuracy.
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
Semantic and Effective Communication for Remote Control Tasks with Dynamic Feature Compression
Authors:
Pietro Talli,
Francesco Pase,
Federico Chiariotti,
Andrea Zanella,
Michele Zorzi
Abstract:
The coordination of robotic swarms and the remote wireless control of industrial systems are among the major use cases for 5G and beyond systems: in these cases, the massive amounts of sensory information that needs to be shared over the wireless medium can overload even high-capacity connections. Consequently, solving the effective communication problem by optimizing the transmission strategy to…
▽ More
The coordination of robotic swarms and the remote wireless control of industrial systems are among the major use cases for 5G and beyond systems: in these cases, the massive amounts of sensory information that needs to be shared over the wireless medium can overload even high-capacity connections. Consequently, solving the effective communication problem by optimizing the transmission strategy to discard irrelevant information can provide a significant advantage, but is often a very complex task. In this work, we consider a prototypal system in which an observer must communicate its sensory data to an actor controlling a task (e.g., a mobile robot in a factory). We then model it as a remote Partially Observable Markov Decision Process (POMDP), considering the effect of adopting semantic and effective communication-oriented solutions on the overall system performance. We split the communication problem by considering an ensemble Vector Quantized Variational Autoencoder (VQ-VAE) encoding, and train a Deep Reinforcement Learning (DRL) agent to dynamically adapt the quantization level, considering both the current state of the environment and the memory of past messages. We tested the proposed approach on the well-known CartPole reference control problem, obtaining a significant performance increase over traditional approaches
△ Less
Submitted 14 January, 2023;
originally announced January 2023.
-
The Cost of Learning: Efficiency vs. Efficacy of Learning-Based RRM for 6G
Authors:
Seyyidahmed Lahmer,
Federico Chiariotti,
Andrea Zanella
Abstract:
In the past few years, Deep Reinforcement Learning (DRL) has become a valuable solution to automatically learn efficient resource management strategies in complex networks. In many scenarios, the learning task is performed in the Cloud, while experience samples are generated directly by edge nodes or users. Therefore, the learning task involves some data exchange which, in turn, subtracts a certai…
▽ More
In the past few years, Deep Reinforcement Learning (DRL) has become a valuable solution to automatically learn efficient resource management strategies in complex networks. In many scenarios, the learning task is performed in the Cloud, while experience samples are generated directly by edge nodes or users. Therefore, the learning task involves some data exchange which, in turn, subtracts a certain amount of transmission resources from the system. This creates a friction between the need to speed up convergence towards an effective strategy, which requires the allocation of resources to transmit learning samples, and the need to maximize the amount of resources used for data plane communication, maximizing users' Quality of Service (QoS), which requires the learning process to be efficient, i.e., minimize its overhead. In this paper, we investigate this trade-off and propose a dynamic balancing strategy between the learning and data planes, which allows the centralized learning agent to quickly converge to an efficient resource allocation strategy while minimizing the impact on QoS. Simulation results show that the proposed method outperforms static allocation methods, converging to the optimal policy (i.e., maximum efficacy and minimum overhead of the learning plane) in the long run.
△ Less
Submitted 30 November, 2022;
originally announced November 2022.
-
Query Timing Analysis for Content-based Wake-up Realizing Informative IoT Data Collection
Authors:
Junya Shiraishi,
Anders E. Kalør,
Federico Chiariotti,
Israel Leyva-Mayorga,
Petar Popovski,
Hiroyuki Yomo
Abstract:
Information freshness and high energy-efficiency are key requirements for sensor nodes serving Industrial Internet of Things (IIoT) applications, where a sink node must collect informative data before a deadline to control an external element. Pull-based communication is an interesting approach for optimizing information freshness and saving wasteful energy. To this end, we apply Content-based Wak…
▽ More
Information freshness and high energy-efficiency are key requirements for sensor nodes serving Industrial Internet of Things (IIoT) applications, where a sink node must collect informative data before a deadline to control an external element. Pull-based communication is an interesting approach for optimizing information freshness and saving wasteful energy. To this end, we apply Content-based Wake-up (CoWu), in which the sink can activate a subset of nodes observing informative data at the time that wake-up signal is received. In this case, the timing of the wake-up signal plays an important role: early transmission leads to high reliability in data collection, but the received data may become obsolete by the deadline, while later transmission ensures a higher timeliness of the sensed data, but some nodes might not manage to communicate their data before the deadline. This letter investigates the timing for data collection using CoWu and characterizes the gain of CoWu. The obtained numerical results show that CoWu improves accuracy, while reducing energy consumption by about 75% with respect to round-robin scheduling.
△ Less
Submitted 1 December, 2022; v1 submitted 29 November, 2022;
originally announced November 2022.
-
Efficient URLLC with a Reconfigurable Intelligent Surface and Imperfect Device Tracking
Authors:
Fabio Saggese,
Federico Chiariotti,
Kimmo Kansanen,
Petar Popovski
Abstract:
The use of Reconfigurable Intelligent Surfaces (RIS) technology to extend coverage and allow for better control of the wireless environment has been proposed in several use cases, including Ultra-Reliable Low-Latency Communications (URLLC), communications. However, the extremely challenging latency constraint makes explicit channel estimation difficult, so positioning information is often used to…
▽ More
The use of Reconfigurable Intelligent Surfaces (RIS) technology to extend coverage and allow for better control of the wireless environment has been proposed in several use cases, including Ultra-Reliable Low-Latency Communications (URLLC), communications. However, the extremely challenging latency constraint makes explicit channel estimation difficult, so positioning information is often used to configure the RIS and illuminate the receiver device. In this work, we analyze the effect of imperfections in the positioning information on the reliability, deriving an upper bound to the outage probability. We then use this bound to perform power control, efficiently finding the minimum power that respects the URLLC constraints under positioning uncertainty. The optimization is conservative, so that all points respect the URLLC constraints, and the bound is relatively tight, with an optimality gap between 1.5 and 4.5~dB.
△ Less
Submitted 16 November, 2022;
originally announced November 2022.
-
Continent-wide Efficient and Fair Downlink Resource Allocation in LEO Satellite Constellations
Authors:
Israel Leyva-Mayorga,
Vineet Gala,
Federico Chiariotti,
Petar Popovski
Abstract:
The integration of Low Earth Orbit (LEO) satellite constellations into 5G and Beyond is essential to achieve efficient global connectivity. As LEO satellites are a global infrastructure with predictable dynamics, a pre-planned fair and load-balanced allocation of the radio resources to provide efficient downlink connectivity over large areas is an achievable goal. In this paper, we propose a distr…
▽ More
The integration of Low Earth Orbit (LEO) satellite constellations into 5G and Beyond is essential to achieve efficient global connectivity. As LEO satellites are a global infrastructure with predictable dynamics, a pre-planned fair and load-balanced allocation of the radio resources to provide efficient downlink connectivity over large areas is an achievable goal. In this paper, we propose a distributed and a global optimal algorithm for satellite-to-cell resource allocation with multiple beams. These algorithms aim to achieve a fair allocation of time-frequency resources and beams to the cells based on the number of users in connected mode (i.e., registered). Our analyses focus on evaluating the trade-offs between average per-user throughput, fairness, number of cell handovers, and computational complexity in a downlink scenario with fixed cells, where the number of users is extracted from a population map. Our results show that both algorithms achieve a similar average per-user throughput. However, the global optimal algorithm achieves a fairness index over 0.9 in all cases, which is more than twice that of the distributed algorithm. Furthermore, by correctly setting the handover cost parameter, the number of handovers can be effectively reduced by more than 70% with respect to the case where the handover cost is not considered.
△ Less
Submitted 11 November, 2022;
originally announced November 2022.
-
Joint Scheduling and Coding for Reliable, Latency-bounded Transmission over Parallel Wireless Links
Authors:
Andrea Bedin,
Federico Chiariotti,
Andrea Zanella
Abstract:
Several novel industrial applications involve human control of vehicles, cranes, or mobile robots through various high-throughput feedback systems, such as Virtual Reality (VR) and tactile/haptic signals. The near real-time interaction between the system and the operator requires strict latency constraints in packet exchange, which is difficult to guarantee over wireless communication links. In th…
▽ More
Several novel industrial applications involve human control of vehicles, cranes, or mobile robots through various high-throughput feedback systems, such as Virtual Reality (VR) and tactile/haptic signals. The near real-time interaction between the system and the operator requires strict latency constraints in packet exchange, which is difficult to guarantee over wireless communication links. In this work, we advocate that packet-level coding and packet scheduling over multiple parallel (unreliable) links have the potential to provide reliable, latency-bounded communication for applications with periodic data generation patterns. However, this goal can be reached only through a careful joint design of such mechanisms, whose interactions can be subtle and difficult to predict. In this paper we first discuss these aspects in general terms, and then present a Markov Decision Process (MDP) model that can be used to find a scheme that optimally exploits the multichannel wireless access in order to maximize the fraction of data blocks delivered within deadline. Our illustrative example is then used to show the optimal coding/scheduling strategies under different combinations of wireless links, also showing that the common solution of backing up a high bitrate unreliable mmWave link with a low bitrate more stable sub-6 GHz link can actually be ineffective in the considered scenario
△ Less
Submitted 25 August, 2022;
originally announced August 2022.
-
Temporal Characterization of VR Traffic for Network Slicing Requirement Definition
Authors:
Federico Chiariotti,
Matteo Drago,
Paolo Testolina,
Mattia Lecci,
Andrea Zanella,
Michele Zorzi
Abstract:
Over the past few years, the concept of VR has attracted increasing interest thanks to its extensive industrial and commercial applications. Currently, the 3D models of the virtual scenes are generally stored in the VR visor itself, which operates as a standalone device. However, applications that entail multi-party interactions will likely require the scene to be processed by an external server a…
▽ More
Over the past few years, the concept of VR has attracted increasing interest thanks to its extensive industrial and commercial applications. Currently, the 3D models of the virtual scenes are generally stored in the VR visor itself, which operates as a standalone device. However, applications that entail multi-party interactions will likely require the scene to be processed by an external server and then streamed to the visors. However, the stringent Quality of Service (QoS) constraints imposed by VR's interactive nature require Network Slicing (NS) solutions, for which profiling the traffic generated by the VR application is crucial. To this end, we collected more than 4 hours of traces in a real setup and analyzed their temporal correlation. More specifically, we focused on the CBR encoding mode, which should generate more predictable traffic streams. From the collected data, we then distilled two prediction models for future frame size, which can be instrumental in the design of dynamic resource allocation algorithms. Our results show that even the state-of-the-art H.264 CBR mode can have significant fluctuations, which can impact the NS optimization. We then exploited the proposed models to dynamically determine the Service Level Agreement (SLA) parameters in an NS scenario, providing service with the required QoS while minimizing resource usage.
△ Less
Submitted 1 June, 2022;
originally announced June 2022.
-
Beam Aware Stochastic Multihop Routing for Flying Ad-hoc Networks
Authors:
Anay Ajit Deshpande,
Roberto Pereira,
Federico Chiariotti,
Adriano Pastore,
Xavier Mestre,
Andrea Zanella
Abstract:
Routing is a crucial component in the design of Flying Ad-Hoc Networks (FANETs). State of the art routing solutions exploit the position of Unmanned Aerial Vehicles (UAVs) and their mobility information to determine the existence of links between them, but this information is often unreliable, as the topology of FANETs can change quickly and unpredictably. In order to improve the tracking performa…
▽ More
Routing is a crucial component in the design of Flying Ad-Hoc Networks (FANETs). State of the art routing solutions exploit the position of Unmanned Aerial Vehicles (UAVs) and their mobility information to determine the existence of links between them, but this information is often unreliable, as the topology of FANETs can change quickly and unpredictably. In order to improve the tracking performance, the uncertainty introduced by imperfect measurements and tracking algorithms needs to be accounted for in the routing. Another important element to consider is beamforming, which can reduce interference, but requires accurate channel and position information to work. In this work, we present the Beam Aware Stochastic Multihop Routing for FANETs (BA-SMURF), a Software-Defined Networking (SDN) routing scheme that takes into account the positioning uncertainty and beamforming design to find the most reliable routes in a FANET. Our simulation results show that joint consideration of the beamforming and routing can provide a 5% throughput improvement with respect to the state of the art.
△ Less
Submitted 24 May, 2022;
originally announced May 2022.
-
Statistical Characterization of Closed-Loop Latency at the Mobile Edge
Authors:
Suraj Suman,
Federico Chiariotti,
Cedomir Stefanovic,
Strahinja Dosen,
Petar Popovski
Abstract:
The stringent timing and reliability requirements in mission-critical applications require a detailed statistical characterization of the latency. Teleoperation is a representative use case, in which a human operator (HO) remotely controls a robot by exchanging command and feedback signals. We present a framework to analyze the latency of a closed-loop teleoperation system consisting of three enti…
▽ More
The stringent timing and reliability requirements in mission-critical applications require a detailed statistical characterization of the latency. Teleoperation is a representative use case, in which a human operator (HO) remotely controls a robot by exchanging command and feedback signals. We present a framework to analyze the latency of a closed-loop teleoperation system consisting of three entities: HO, robot located in remote environment, and a Base Station (BS) with Mobile edge Computing (MEC) capabilities. A model of each component of the system is used to analyze the closed-loop latency and decide upon the optimal compression strategy. The closed-form expression of the distribution of the closed-loop latency is difficult to estimate, such that suitable upper and lower bounds are obtained. We formulate a non-convex optimization problem to minimize the closed-loop latency. Using the obtained upper and lower bound on the closed-loop latency, a computationally efficient procedure to optimize the closed-loop latency is presented. The simulation results reveal that compression of sensing data is not always beneficial, while system design based on average performance leads to under-provisioning and may cause performance degradation. The applicability of the proposed analysis is much wider than teleoperation, for systems whose latency budget consists of many components.
△ Less
Submitted 11 May, 2022;
originally announced May 2022.
-
Scheduling of Sensor Transmissions Based on Value of Information for Summary Statistics
Authors:
Federico Chiariotti,
Anders E. Kalør,
Josefine Holm,
Beatriz Soret,
Petar Popovski
Abstract:
The optimization of Value of Information (VoI) in sensor networks integrates awareness of the measured process in the communication system. However, most existing scheduling algorithms do not consider the specific needs of monitoring applications, but define VoI as a generic Mean Square Error (MSE) of the whole system state regardless of the relevance of individual components. In this work, we con…
▽ More
The optimization of Value of Information (VoI) in sensor networks integrates awareness of the measured process in the communication system. However, most existing scheduling algorithms do not consider the specific needs of monitoring applications, but define VoI as a generic Mean Square Error (MSE) of the whole system state regardless of the relevance of individual components. In this work, we consider different summary statistics, i.e., different functions of the state, which can represent the useful information for a monitoring process, particularly in safety and industrial applications. We propose policies that minimize the estimation error for different summary statistics, showing significant gains by simulation.
△ Less
Submitted 26 April, 2022;
originally announced April 2022.
-
Learning to Speak on Behalf of a Group: Medium Access Control for Sending a Shared Message
Authors:
Shaan ul Haque,
Siddharth Chandak,
Federico Chiariotti,
Deniz Gunduz,
Petar Popovski
Abstract:
The rapid development of Industrial Internet of Things (IIoT) technologies has not only enabled new applications, but also presented new challenges for reliable communication with limited resources. In this work, we define a deceptively simple novel problem that can arise in these scenarios, in which a set of sensors need to communicate a joint observation. This observation is shared by a random s…
▽ More
The rapid development of Industrial Internet of Things (IIoT) technologies has not only enabled new applications, but also presented new challenges for reliable communication with limited resources. In this work, we define a deceptively simple novel problem that can arise in these scenarios, in which a set of sensors need to communicate a joint observation. This observation is shared by a random subset of the nodes, which need to propagate it to the rest of the network, but coordination is complex: as signaling constraints require the use of random access schemes over shared channels, each sensor needs to implicitly coordinate with others with the same observation, so that at least one of the transmissions gets through without collisions. Unlike existing medium access control schemes, the goal here is not to maximize total goodput, but rather to make sure that the shared message gets through, regardless of the sender. The lack of any signaling, aside from an acknowledgment or lack thereof from the rest of the network, makes determining the optimal collective transmission strategy a significant challenge. We analyze this coordination problem theoretically, prove its hardness, and provide low-complexity solutions. While a low-complexity clustering-based approach is shown to provide near-optimal performance in certain special cases, for the general scenarios, we model each sensor as a multi-armed bandit (MAB), and provide a learning-based solution. Numerical results show the effectiveness of this approach in a variety of cases.
△ Less
Submitted 1 February, 2022;
originally announced February 2022.
-
Temporal Characterization of XR Traffic with Application to Predictive Network Slicing
Authors:
Mattia Lecci,
Federico Chiariotti,
Matteo Drago,
Andrea Zanella,
Michele Zorzi
Abstract:
Over the past few years, eXtended Reality (XR) has attracted increasing interest thanks to its extensive industrial and commercial applications, and its popularity is expected to rise exponentially over the next decade. However, the stringent Quality of Service (QoS) constraints imposed by XR's interactive nature require Network Slicing (NS) solutions to support its use over wireless connections:…
▽ More
Over the past few years, eXtended Reality (XR) has attracted increasing interest thanks to its extensive industrial and commercial applications, and its popularity is expected to rise exponentially over the next decade. However, the stringent Quality of Service (QoS) constraints imposed by XR's interactive nature require Network Slicing (NS) solutions to support its use over wireless connections: in this context, quasi-Constant Bit Rate (CBR) encoding is a promising solution, as it can increase the predictability of the stream, making the network resource allocation easier. However, traffic characterization of XR streams is still a largely unexplored subject, particularly with this encoding. In this work, we characterize XR streams from more than 4 hours of traces captured in a real setup, analyzing their temporal correlation and proposing two prediction models for future frame size. Our results show that even the state-of-the-art H.264 CBR mode can have significant frame size fluctuations, which can impact the NS optimization. Our proposed prediction models can be applied to different traces, and even to different contents, achieving very similar performance. We also show the trade-off between network resource efficiency and XR QoS in a simple NS use case.
△ Less
Submitted 18 January, 2022;
originally announced January 2022.
-
No Free Lunch: Balancing Learning and Exploitation at the Network Edge
Authors:
Federico Mason,
Federico Chiariotti,
Andrea Zanella
Abstract:
Over the last few years, the DRL paradigm has been widely adopted for 5G and beyond network optimization because of its extreme adaptability to many different scenarios. However, collecting and processing learning data entail a significant cost in terms of communication and computational resources, which is often disregarded in the networking literature. In this work, we analyze the cost of learni…
▽ More
Over the last few years, the DRL paradigm has been widely adopted for 5G and beyond network optimization because of its extreme adaptability to many different scenarios. However, collecting and processing learning data entail a significant cost in terms of communication and computational resources, which is often disregarded in the networking literature. In this work, we analyze the cost of learning in a resource-constrained system, defining an optimization problem in which training a DRL agent makes it possible to improve the resource allocation strategy but also reduces the number of available resources. Our simulation results show that the cost of learning can be critical when evaluating DRL schemes on the network edge and that assuming a cost-free learning model can lead to significantly overestimating performance.
△ Less
Submitted 23 November, 2021;
originally announced November 2021.
-
Internet of Things (IoT) Connectivity in 6G: An Interplay of Time, Space, Intelligence, and Value
Authors:
Petar Popovski,
Federico Chiariotti,
Victor Croisfelt,
Anders E. Kalør,
Israel Leyva-Mayorga,
Letizia Marchegiani,
Shashi Raj Pandey,
Beatriz Soret
Abstract:
Internet of Things (IoT) connectivity has a prominent presence in the 5G wireless communication systems. As these systems are being deployed, there is a surge of research efforts and visions towards 6G wireless systems. In order to position the evolution of IoT within the 6G systems, this paper first takes a critical view on the way IoT connectivity is supported within 5G. Following that, the wire…
▽ More
Internet of Things (IoT) connectivity has a prominent presence in the 5G wireless communication systems. As these systems are being deployed, there is a surge of research efforts and visions towards 6G wireless systems. In order to position the evolution of IoT within the 6G systems, this paper first takes a critical view on the way IoT connectivity is supported within 5G. Following that, the wireless IoT evolution is discussed through multiple dimensions: time, space, intelligence, and value. We also conjecture that the focus will broaden from IoT devices and their connections towards the emergence of complex IoT environments, seen as building blocks of the overall IoT ecosystem.
△ Less
Submitted 11 November, 2021; v1 submitted 10 November, 2021;
originally announced November 2021.
-
Remote Anomaly Detection in Industry 4.0 Using Resource-Constrained Devices
Authors:
Anders E. Kalør,
Daniel Michelsanti,
Federico Chiariotti,
Zheng-Hua Tan,
Petar Popovski
Abstract:
A central use case for the Internet of Things (IoT) is the adoption of sensors to monitor physical processes, such as the environment and industrial manufacturing processes, where they provide data for predictive maintenance, anomaly detection, or similar. The sensor devices are typically resource-constrained in terms of computation and power, and need to rely on cloud or edge computing for data p…
▽ More
A central use case for the Internet of Things (IoT) is the adoption of sensors to monitor physical processes, such as the environment and industrial manufacturing processes, where they provide data for predictive maintenance, anomaly detection, or similar. The sensor devices are typically resource-constrained in terms of computation and power, and need to rely on cloud or edge computing for data processing. However, the capacity of the wireless link and their power constraints limit the amount of data that can be transmitted to the cloud. While this is not problematic for the monitoring of slowly varying processes such as temperature, it is more problematic for complex signals such as those captured by vibration and acoustic sensors. In this paper, we consider the specific problem of remote anomaly detection based on signals that fall into the latter category over wireless channels with resource-constrained sensors. We study the impact of source coding on the detection accuracy with both an anomaly detector based on Principal Component Analysis (PCA) and one based on an autoencoder. We show that the coded transmission is beneficial when the signal-to-noise ratio (SNR) of the channel is low, while uncoded transmission performs best in the high SNR regime.
△ Less
Submitted 12 October, 2021;
originally announced October 2021.
-
Optimal Latency-Oriented Scheduling in Parallel Queuing Systems
Authors:
Andrea Bedin,
Federico Chiariotti,
Stepan Kucera,
Andrea Zanella
Abstract:
The evolution of 5G and Beyond networks has enabled new applications with stringent end-to-end latency requirements, but providing reliable low-latency service with high throughput over public wireless networks is still a significant challenge. One of the possible ways to solve this is to exploit path diversity, encoding the information flow over multiple streams across parallel links. The challen…
▽ More
The evolution of 5G and Beyond networks has enabled new applications with stringent end-to-end latency requirements, but providing reliable low-latency service with high throughput over public wireless networks is still a significant challenge. One of the possible ways to solve this is to exploit path diversity, encoding the information flow over multiple streams across parallel links. The challenge presented by this approach is the design of joint coding and scheduling algorithms that adapt to the state of links to take full advantage of path diversity. In this paper, we address this problem for a synchronous traffic source that generates data blocks at regular time intervals (e.g., a video with constant frame rate) and needs to deliver each block within a predetermined deadline. We first develop a closed-form performance analysis in the simple case of two parallel servers without any buffering and single-packet blocks, and propose a model for the general problem based on a Markov Decision Process (MDP). We apply policy iteration to obtain the coding and scheduling policy that maximizes the fraction of source blocks delivered within the deadline: our simulations show the drawbacks of different commonly applied heuristic solutions, drawing general design insights on the optimal policy.
△ Less
Submitted 25 August, 2022; v1 submitted 31 August, 2021;
originally announced August 2021.
-
Latency and Information Freshness in Multipath Communications for Virtual Reality
Authors:
Federico Chiariotti,
Beatriz Soret,
Petar Popovski
Abstract:
Wireless Virtual Reality (VR) and Augmented Reality (AR) will contribute to people increasingly working and socializing remotely. However, the VR/AR experience is very susceptible to various delays and timing discrepancies, which can lead to motion sickness and discomfort. This paper models and exploits the existence of multiple paths and redundancy to improve the timing performance of wireless VR…
▽ More
Wireless Virtual Reality (VR) and Augmented Reality (AR) will contribute to people increasingly working and socializing remotely. However, the VR/AR experience is very susceptible to various delays and timing discrepancies, which can lead to motion sickness and discomfort. This paper models and exploits the existence of multiple paths and redundancy to improve the timing performance of wireless VR communications. We consider Multiple Description Coding (MDC), a scheme where the video stream is encoded in Q streams (Q = 2 in this paper) known as descriptors and delivered independently over multiple paths. We also consider an alternating scheme, that simply switches between the paths. We analyze the full distribution of two relevant metrics: the packet delay and the Peak Age of Information (PAoI), which measures the freshness of the information at the receiver. The results show interesting trade-offs between picture quality, frame rate, and latency: full duplication results in fewer lost frames, but a higher latency than schemes with less redundancy. Even the simple alternating scheme can outperform duplication in terms of PAoI, but MDC can exploit the independent decodability of the descriptors to deliver a basic version of the frames faster, while still getting the full-quality frames with a slightly higher delay.
△ Less
Submitted 10 June, 2021;
originally announced June 2021.
-
A Perspective on Time towards Wireless 6G
Authors:
Petar Popovski,
Federico Chiariotti,
Kaibin Huang,
Anders E. Kalør,
Marios Kountouris,
Nikolaos Pappas,
Beatriz Soret
Abstract:
With the advent of 5G technology, the notion of latency got a prominent role in wireless connectivity, serving as a proxy term for addressing the requirements for real-time communication. As wireless systems evolve towards 6G, the ambition to immerse the digital into the physical reality will increase. Besides making the real-time requirements more stringent, this immersion will bring the notions…
▽ More
With the advent of 5G technology, the notion of latency got a prominent role in wireless connectivity, serving as a proxy term for addressing the requirements for real-time communication. As wireless systems evolve towards 6G, the ambition to immerse the digital into the physical reality will increase. Besides making the real-time requirements more stringent, this immersion will bring the notions of time, simultaneity, presence, and causality to a new level of complexity. A growing body of research points out that latency is insufficient to parameterize all real-time requirements. Notably, one such requirement that received a significant attention is information freshness, defined through the Age of Information (AoI) and its derivatives. The objective of this article is to investigate the general notion of timing in wireless communication systems and networks and its relation to effective information generation, processing, transmission, and reconstruction at the senders and receivers. We establish a general statistical framework of timing requirements in wireless communication systems, which subsumes both latency and AoI. The framework is made by associating a timing component with the two basic statistical operations, decision and estimation. We first use the framework to present a representative sample of the existing works that deal with timing in wireless communication. Next, it is shown how the framework can be used with different communication models of increasing complexity, starting from the basic Shannon one-way communication model and arriving to communication models for consensus, distributed learning, and inference. Overall, this paper fills an important gap in the literature by providing a systematic treatment of various timing measures in wireless communication and sets the basis for design and optimization for the next-generation real-time systems.
△ Less
Submitted 12 May, 2022; v1 submitted 8 June, 2021;
originally announced June 2021.
-
Query Age of Information: Freshness in Pull-Based Communication
Authors:
Federico Chiariotti,
Josefine Holm,
Anders E. Kalør,
Beatriz Soret,
Søren K. Jensen,
Torben B. Pedersen,
Petar Popovski
Abstract:
Age of Information (AoI) has become an important concept in communications, as it allows system designers to measure the freshness of the information available to remote monitoring or control processes. However, its definition tacitly assumes that new information is used at any time, which is not always the case: the instants at which information is collected and used are dependent on a certain qu…
▽ More
Age of Information (AoI) has become an important concept in communications, as it allows system designers to measure the freshness of the information available to remote monitoring or control processes. However, its definition tacitly assumes that new information is used at any time, which is not always the case: the instants at which information is collected and used are dependent on a certain query process. We propose a model that accounts for the discrete time nature of many monitoring processes, considering a pull-based communication model in which the freshness of information is only important when the receiver generates a query: if the monitoring process is not using the value, the age of the last update is irrelevant. We then define the Age of Information at Query (QAoI), a more general metric that fits the pull-based scenario, and show how its optimization can lead to very different choices from traditional push-based AoI optimization when using a Packet Erasure Channel (PEC) and with limited link availability. Our results show that QAoI-aware optimization can significantly reduce the average and worst-case perceived age for both periodic and stochastic queries.
△ Less
Submitted 12 January, 2022; v1 submitted 14 May, 2021;
originally announced May 2021.
-
Distributed Reinforcement Learning for Flexible and Efficient UAV Swarm Control
Authors:
Federico Venturini,
Federico Mason,
Francesco Pase,
Federico Chiariotti,
Alberto Testolin,
Andrea Zanella,
Michele Zorzi
Abstract:
Over the past few years, the use of swarms of Unmanned Aerial Vehicles (UAVs) in monitoring and remote area surveillance applications has become widespread thanks to the price reduction and the increased capabilities of drones. The drones in the swarm need to cooperatively explore an unknown area, in order to identify and monitor interesting targets, while minimizing their movements. In this work,…
▽ More
Over the past few years, the use of swarms of Unmanned Aerial Vehicles (UAVs) in monitoring and remote area surveillance applications has become widespread thanks to the price reduction and the increased capabilities of drones. The drones in the swarm need to cooperatively explore an unknown area, in order to identify and monitor interesting targets, while minimizing their movements. In this work, we propose a distributed Reinforcement Learning (RL) approach that scales to larger swarms without modifications. The proposed framework relies on the possibility for the UAVs to exchange some information through a communication channel, in order to achieve context-awareness and implicitly coordinate the swarm's actions. Our experiments show that the proposed method can yield effective strategies, which are robust to communication channel impairments, and that can easily deal with non-uniform distributions of targets and obstacles. Moreover, when agents are trained in a specific scenario, they can adapt to a new one with minimal additional training. We also show that our approach achieves better performance compared to a computationally intensive look-ahead heuristic.
△ Less
Submitted 8 March, 2021;
originally announced March 2021.
-
RAN Slicing Performance Trade-offs: Timing versus Throughput Requirements
Authors:
Federico Chiariotti,
Israel Leyva-Mayorga,
Čedomir Stefanović,
Anders E. Kalør,
Petar Popovski
Abstract:
The coexistence of diverse services with heterogeneous requirements is a fundamental feature of 5G. This necessitates efficient radio access network (RAN) slicing, defined as sharing of the wireless resources among diverse services while guaranteeing their respective throughput, timing, and/or reliability requirements. In this paper, we investigate RAN slicing for an uplink scenario in the form of…
▽ More
The coexistence of diverse services with heterogeneous requirements is a fundamental feature of 5G. This necessitates efficient radio access network (RAN) slicing, defined as sharing of the wireless resources among diverse services while guaranteeing their respective throughput, timing, and/or reliability requirements. In this paper, we investigate RAN slicing for an uplink scenario in the form of multiple access schemes for two user types: (1) broadband users with throughput requirements and (2) intermittently active users with timing requirements, expressed as either latency-reliability (LR) or Peak Age of Information (PAoI). Broadband users transmit data continuously, hence, are allocated non-overlapping parts of the spectrum. We evaluate the trade-offs between the achievable throughput of a broadband user and the timing requirements of an intermittent user under Orthogonal Multiple Access (OMA) and Non-Orthogonal Multiple Access (NOMA), considering capture. Our analysis shows that NOMA, in combination with packet-level coding, is a superior strategy in most cases for both LR and PAoI, achieving a similar LR with only slight 2% decrease in throughput with respect to the upper bound in performance. However, there are extreme cases where OMA achieves a slightly greater throughput than NOMA at the expense of an increased PAoI.
△ Less
Submitted 19 August, 2021; v1 submitted 6 March, 2021;
originally announced March 2021.
-
A Survey on 360-Degree Video: Coding, Quality of Experience and Streaming
Authors:
Federico Chiariotti
Abstract:
The commercialization of Virtual Reality (VR) headsets has made immersive and 360-degree video streaming the subject of intense interest in the industry and research communities. While the basic principles of video streaming are the same, immersive video presents a set of specific challenges that need to be addressed. In this survey, we present the latest developments in the relevant literature on…
▽ More
The commercialization of Virtual Reality (VR) headsets has made immersive and 360-degree video streaming the subject of intense interest in the industry and research communities. While the basic principles of video streaming are the same, immersive video presents a set of specific challenges that need to be addressed. In this survey, we present the latest developments in the relevant literature on four of the most important ones: (i) omnidirectional video coding and compression, (ii) subjective and objective Quality of Experience (QoE) and the factors that can affect it, (iii) saliency measurement and Field of View (FoV) prediction, and (iv) the adaptive streaming of immersive 360-degree videos. The final objective of the survey is to provide an overview of the research on all the elements of an immersive video streaming system, giving the reader an understanding of their interplay and performance.
△ Less
Submitted 16 February, 2021;
originally announced February 2021.
-
Hidden Markov Model-Based Encoding for Time-Correlated IoT Sources
Authors:
Siddharth Chandak,
Federico Chiariotti,
Petar Popovski
Abstract:
As the use of Internet of Things (IoT) devices for monitoring purposes becomes ubiquitous, the efficiency of sensor communication is a major issue for the modern Internet. Channel coding is less efficient for extremely short packets, and traditional techniques that rely on source compression require extensive signaling or pre-existing knowledge of the source dynamics. In this work, we propose an e…
▽ More
As the use of Internet of Things (IoT) devices for monitoring purposes becomes ubiquitous, the efficiency of sensor communication is a major issue for the modern Internet. Channel coding is less efficient for extremely short packets, and traditional techniques that rely on source compression require extensive signaling or pre-existing knowledge of the source dynamics. In this work, we propose an encoding and decoding scheme that learns source dynamics online using a Hidden Markov Model (HMM), puncturing a short packet code to outperform existing compression-based approaches. Our approach shows significant performance improvements for sources that are highly correlated in time, with no additional complexity on the sender side.
△ Less
Submitted 20 January, 2021; v1 submitted 19 January, 2021;
originally announced January 2021.